Abstract

Many applications from the Internet of Things (IoT) domain used in healthcare, smart homes, and cities involve a large number of interconnected wireless devices. To ensure privacy, confidentiality, and integrity of the information, devices should be initialized prior to any communication. In this paper, we present a secure initialization method for constrained IoT devices such as wireless sensors devices and/or actuators. The solution uses visible light communication (VLC) for the initial configuration of the IoT devices. The VLC system consists of a modulated light source such as a smartphone screen and a very simple photodetector. We analyze known coding and modulation techniques used for the VLC and propose BlinkComm, a differential coding technique that achieves threefold increase in transmission speed compared to existing solutions. We showed through experiments with 32 participants that the proposed solution achieves fast completion times and low error rates as well as high user satisfaction levels.

Highlights

  • Today we are surrounded by plethora of Internet of Things (IoT) devices that find their application in many areas of our everyday lives

  • Recalling from previous section, we have shown that it is quite difficult in practical situations to control screen framerate, where effects such as Synchronization Learning Phase frame overflow require designers of coding and modulation schemes to introduce mechanisms to recover from errors during decoding phase at the price of reduced transmission speed

  • As we showed throughout the paper, errors from intersymbol interference and frame overflow restricted us to focus on finding such coding techniques that would minimize their impact but still provide sufficiently large transmission speed, which are still larger than commercially available solutions

Read more

Summary

Introduction

Today we are surrounded by plethora of Internet of Things (IoT) devices that find their application in many areas of our everyday lives. IoT devices can communicate with each other as well as with personal devices such as smartphones, tablets, smart TVs, or computers, through different wireless networking technologies (such as Bluetooth, ZigBee, WiFi, 6LoWPAN, and LoRaWAN). Many of these IoT devices use mobile communication techniques to establish a direct access to remote web servers. IoT device must be initialized to ensure secure communication

Objectives
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call